Skip to content

Reduce the permissions on CRDs and Validating / Mutating webhooks #1641

@kfox1111

Description

@kfox1111

We started looking into deploying: metallb v0.13.6.

It has permissions to edit all crds on the cluster as well as all validating/mutating webhooks on the cluster.

This is a lot of permissions on a long running service that could really damage the cluster badly.

It should be possible to use a resourceNames section (https://kubernetes.io/docs/reference/access-authn-authz/rbac/#referring-to-resources) on the roles to restrict the access just to the things the controller actually needs to edit.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions